General
-
Target
f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc.exe
-
Size
1.1MB
-
Sample
250206-jervkaxqcx
-
MD5
007c92b8ad2188efb216f2699a386238
-
SHA1
c780a61bde93f59fa404ed217707f99e86f0c1fd
-
SHA256
f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc
-
SHA512
df65a0fb78ec1453921c8861f73d6dc8379797646d6aa66b7d20ea06bf7688fe4f009d720565c5075724a0da0d657b2bcdc5c4c0717e9ffcabf3d54123ce9e3b
-
SSDEEP
24576:U2G/nvxW3Ww0tSUtIrZBMreAydD8FVgMjt2:UbA30SaIrfAUD8rM
Behavioral task
behavioral1
Sample
f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc.exe
-
Size
1.1MB
-
MD5
007c92b8ad2188efb216f2699a386238
-
SHA1
c780a61bde93f59fa404ed217707f99e86f0c1fd
-
SHA256
f1eec0d8c323b0db81ee756d99d00020cf1f7602e4dc158b82c973e9fb5750fc
-
SHA512
df65a0fb78ec1453921c8861f73d6dc8379797646d6aa66b7d20ea06bf7688fe4f009d720565c5075724a0da0d657b2bcdc5c4c0717e9ffcabf3d54123ce9e3b
-
SSDEEP
24576:U2G/nvxW3Ww0tSUtIrZBMreAydD8FVgMjt2:UbA30SaIrfAUD8rM
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-